68
CHAPTER 4 Information Security

CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Embed Size (px)

Citation preview

Page 1: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

CHAPTER 4

Information Security

Page 2: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

CHAPTER OUTLINE

4.1 Introduction to Information Security

4.2 Unintentional Threats to Information Security

4.3 Deliberate Threats to Information Security

4.4 What Organizations Are Doing to Protect

Information Resources

4.5 Information Security Controls

Page 3: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

LEARNING OBJECTIVES

1. Identify the five factors that contribute to the increasing vulnerability of information resources, and provide a specific example of each one.

2. Compare and contrast human mistakes and social engineering, and provide a specific example of each one.

3. Discuss the ten types of deliberate attacks.

Page 4: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

LEARNING OBJECTIVES (continued)

4. Define the three risk mitigation strategies, and provide an example of each one in the context of you owning a home.

5. Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one.

Page 5: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Opening Case: Kim Dotcom

Page 6: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

4.1 Introduction to Information Security

Page 7: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Key Information Security Terms

Information Security

Threat

Exposure

Vulnerability

Example of a threat (video)

Page 8: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Five Factors Increasing the Vulnerability of Information Resources

Today’s interconnected, interdependent, wirelessly-networked business environment

Smaller, faster, cheaper computers and storage devices

Decreasing skills necessary to be a hacker

Organized crime taking over cybercrime

Lack of management support

Page 9: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Networked Business Environment

Page 10: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Smaller, Faster Devices

Page 11: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Increasing Sophistication of Attacks

Low

High

1980 2011

Attack Sophistication

Knowledge Required by Intruder

WiGLE.net

New & Easier Attack Tools

Decreasing Skills Needed to be a hacker

New & Easier Tools make it very easy to attack the Network

Page 12: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Organized Crime Taking Over Cybercrime

Page 13: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Lack of Management Support

Page 14: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

4.2 Unintentional Threats to Information Systems

Page 15: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Security Threats (Figure 4.1)

Page 16: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Most Dangerous Employees

Human resources and MIS

These employees hold ALL the information

Page 17: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Consultants, Janitors and Security Guards

Page 18: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Human Errors

Carelessness with laptops and portable computing devices

Opening questionable e-mails

Careless Internet surfing

Poor password selection and use

And more

Page 19: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Social Engineering

Two examples

Tailgating

Shoulder surfing

Page 20: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Anti-Tailgating Door

Page 21: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Shoulder Surfing

Page 22: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

The “King” of Social Engineering

60 Minutes Interview with Kevin Mitnick

Kevin Mitnick served several years in a federal prison. Upon his release, he opened his own consulting firm, advising companies on how to deter people like him

See his company here

Page 23: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

4.3 Deliberate Threats to Information Systems

Page 24: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Deliberate Threats

Espionage or trespass

Information extortion

Sabotage or vandalism

Theft of equipment or information For example, dumpster diving

Page 25: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Deliberate Threats (continued)

Identify theft

Identity theft video

Compromises to intellectual property

Medical identity theft video

Page 26: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Deliberate Threats (continued)

Software attacksVirus

Worm 1988: first widespread worm, created by Robert T. Morris, Jr.

(see the rapid spread of the Slammer worm)

Trojan horse

Logic Bomb

Page 27: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Software attacks (continued)Phishing attacks

Phishing slideshow Phishing quiz Phishing example Phishing example

Distributed denial-of-service attacks See botnet demonstration

Deliberate Threats (continued)

Page 28: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

How to Detect a Phish E-mail

Page 29: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Is the email really from eBay, or PayPal, or a bank?

As Spammers get better, their emails look more genuine. How do you tell if it’s a scam and phishing for personal information? Here’s how ...

Page 30: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Is the email really from eBay, or PayPal, or a bank?

As an example, here is what the email said: Return-path: <[email protected]> From: "PayPal"<[email protected]> Subject: You have 1 new Security Message Alert !

Note that they even give

advice in the right column

about security

Page 31: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Example Continued – bottom of the email

Page 32: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

How to see what is happening View Source In Outlook, right click on email, click ‘view source’ In GroupWise, open email and click on the Message Source tab In Mozilla Thunderbird, click on View, and Source. Below is the part of the text that makes the email look official – the images came

from the PayPal website.

Page 33: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

View Source – The Real Link

In the body it said, “If you are traveling, “Travelling Confirmation Here”

Here is where you are really being sent href=3Dftp://futangiu:[email protected]/

index.htm

Notice that the link is not only not PayPal, it is an IP address, 2 giveaways of a fraudulent link.

Page 34: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Another Example – Amazon

View Source

Page 35: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Deliberate Threats (continued)

Alien SoftwareSpyware (see video)

Spamware

CookiesCookie demo

Page 36: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Keystroke Logger (Keylogger)

Plugs in between monitor and computer

Page 37: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Example of CAPTCHA

Page 38: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Deliberate Threats (continued)

Supervisory control and data acquisition (SCADA) attacks

Wireless sensor

Page 39: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

What if a SCADA attack were successful?

Northeastern U.S. power outage in 2003

Page 40: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Results of the power outage in NYC

Page 41: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

More results of power outage in NYC

Page 42: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Example of SCADA attack (and cyberwarfare)

The Stuxnet Worm (IT’s About Business 4.3)

Where Stuxnet struck

Stuxnet video

Page 43: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Cyberwarfare and Cyberterrorism

See video

Page 44: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

4.4 What Organizations Are Doing to Protect Themselves

Page 45: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Risk!

There is always risk!

Page 46: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

And then there is real risk!

Page 47: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Risk Management

Risk

Risk management

Risk analysis

Risk mitigation

Page 48: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Risk Mitigation Strategies

Risk Acceptance

Risk limitation

Risk transference

Page 49: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Risk Optimization

Page 50: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

4.5 Information Security Controls

Page 51: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Information Security Controls

Physical controls

Access controls

Communications (network) controls

Page 52: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Where Defense Mechanisms (Controls) Are Located

Page 53: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Access Controls

AuthenticationSomething the user is (biometrics powerpoints)

Video on biometrics The latest biometric: gait recognition

Something the user has

Something the user does

Something the user knows passwords passphrases

Page 54: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Access Controls (continued)

Authorization

Privilege

Least privilege

Page 55: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Communications Controls

Firewalls

Anti-malware systems

Whitelisting and Blacklisting

Encryption

Page 56: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Communication or Network Controls (continued)

Virtual private networking

Secure Socket Layer (now transport layer security)

Employee monitoring systems

Page 57: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Basic Home Firewall (top) and Corporate Firewall (bottom)

Page 58: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Whitelisting and Blacklisting

Whitelisting Blacklisting

Page 59: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

How Digital Certificates Work

Page 60: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Virtual Private Network and Tunneling

Page 61: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Transport Layer Security

Page 62: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Popular Employee Monitoring Systems

Page 63: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Employee Monitoring System

Page 64: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Business Continuity Planning, Backup, and Recovery

Hot Site

Warm Site

Cold Site

Page 65: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Information Systems Auditing

Types of Auditors and Audits

Internal

External

Page 66: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

IS Auditing Procedure

Auditing around the computer

Auditing through the computer

Auditing with the computer

Page 67: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Chapter Closing Case

Page 68: CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate

Chapter Closing Case